Malware

Type: Keyphrase
Name: Malware
First reported 2 hours ago - Updated 47 mins ago - 4 reports

U.S. Government Issues Warning About Malicious Software

The U.S. Department Of Homeland Security warned retailers about a malicious software attacking point-of-sales systems, dubbed "Backoff," which is undetectable by anti-virus software.The agency said that the payment-card-stealing virus Backoff has been ... [Published CdrInfo.com - 47 mins ago]
First reported 1 hour ago - Updated 47 mins ago - 2 reports

Hackers Can Use USB Devices in Attacks

USB devices such as keyboards can be used to hack into PCs, German crypto specialist and and chief scientist with Berlin's SR Labs Karsten Nohl revealed on Thursday.Nohl said that that hackers could load malicious software onto the chipsets that control ... [Published CdrInfo.com - 47 mins ago]
Entities: Hacker, Attack, Malware
First reported 22 hours ago - Updated 48 mins ago - 15 reports

BadUSB: Undetectable USB security flaw

Researchers have detected a flaw in the popular USB devices that everyone loves. Not just on certain devices, practically every single USB device can be exploited, which puts the number of in the billions. What made the USB so widely accepted in the ... [Published Examiner.com - 48 mins ago]
First reported 6 hours ago - Updated 1 hour ago - 6 reports

Attackers can easily create dangerous file-encrypting malware, new threat suggests

A new program that encrypts files to extort money from users highlights that attackers don't need advanced programming skills to create dangerous and effective ransomware threats, especially when strong encryption technology is freely available.Researchers ... [Published Computerworld Australia - 3 hours ago]
First reported Jul 31 2014 - Updated 4 hours ago - 22 reports

Stealthy new malware snatching credit cards from retailers’ POS systems

Posted by InfoSec News on Aug 01 http://arstechnica.com/security/2014/07/stealthy-new-malware-snatching-credit-cards-from-retailers-pos-systems/ By Sean GallagherArs TechnicaJuly 31, 2014US Computer Emergency Response Team, in cooperation with the ... [Published Seclists.org - Info Security News - 4 hours ago]
First reported Jul 31 2014 - Updated 6 hours ago - 4 reports

Beware of these Facebook malware scams

Would you like to find out how many people have visited your Facebook page this week? Or do you want to change that blue colour of your Facebook page? If so, be very wary of clicking on any related links in your Facebook news feed. The digital ... [Published Tech Digest - 6 hours ago]
First reported Jul 31 2014 - Updated 8 hours ago - 13 reports

Hackers can exploit USB devices to trigger undetectable attacks

A popular security researcher revealed that bad actors can tap into USB Devices to conduct attacks non detectable with known security defenses. Security experts demonstrated that USB devices can be used to compromise personal computers in a potential ... [Published Security Affairs - 9 hours ago]
First reported Jul 31 2014 - Updated 10 hours ago - 17 reports

'BadUSB' malware lives in USB firmware to remain undetected, unfixable

, 10:26 pm PT (01:26 am ET) By AppleInsider Staff A pair of researchers has discovered a flaw in the USB protocol's basic architecture that allows for malware to be programed into a device's firmware, making it nearly undetectable and impossible to p ... [Published Apple Insider - 10 hours ago]
First reported Jul 31 2014 - Updated 13 hours ago - 3 reports

Mysterious Malware 'Crouching Yeti' Has Infected High-Profile Targets Worldwide

Energetic Bear , a malware campaign that was initially thought to have come from Russia and only target power grids, is much more widespread and potentially dangerous than cybersecurity experts first imagined.A new report by the Kaspersky Lab indicates ... [Published Motherboard Magazine - 21 hours ago]
First reported Jul 31 2014 - Updated 23 hours ago - 2 reports

Backoff - Technical Analysis

As discussed in the an advisory published by US-CERT , Trustwave SpiderLabs has discovered a previously unidentified family of Point of Sale (PoS) malware. This blog post serves as a technical analysis of the Backoff malware family. While a number of ... [Published SpiderLabs Anterior - 23 hours ago]
First reported Jul 30 2014 - Updated Jul 30 2014 - 3 reports

Threat Outbreak Alert RuleID10870: Email Messages Distributing Malicious Software on July 30, 2014

Entities: Malware, Threat
First reported Jul 30 2014 - Updated Jul 30 2014 - 5 reports

Android fake ID bug exposed

In response to the news that security researchers have discovered an Android flaw that lets malware insert malicious code into other apps, gain access to the user's credit card data and take control of the device's settings, Craig Young, security researcher ... [Published Vigilance Security Magazine - Jul 30 2014]

Quotes

"You cannot tell where the virus came from. It is almost like a magic trick" said Nohl
Harrell said, "Honeypots support the emulation of thousands of networks and applications in order to appear as desirable targets for malware, bots, and hackers." The proprietary honeypot is capable of facing the internet with millions of different appearances such as users, servers, and network devices...
...The researchers alleged that the USB controller chips in most common flash drives have no protection against reprogramming. "Once reprogrammed, benign devices can turn malicious in many ways" the researchers stated...
...He cited the NSA's USB surveillance tech known as Cottonmouth as a potential example of BadUSB in action, adding, "I wouldn't be surprised if some of the things [Mr. Nohl] discovered are what we heard about in the NSA catalogue."

More Content

All (13680) | News (6913) | Reports (3) | Blogs (6726) | Audio/Video (3) | Fact Sheets (4) | Press Releases (25)
sort by: Date | Relevance
Hackers Can Use USB Devices in Attacks [Published CdrInfo.com - 47 mins ago]
U.S. Government Issues Warning About Malicious ... [Published CdrInfo.com - 47 mins ago]
DarkMatter: Curing the internet of digital threats [Published Tech Republic - 48 mins ago]
BadUSB: Undetectable USB security flaw [Published Examiner.com - 48 mins ago]
New Flaws in USB Devices Let Attackers Install ... [Published eWeek - 1 hour ago]
Homeland Security warns retailers about virus [Published Payments Business - 1 hour ago]
Department of Homeland Security warns retailers... [Published TechSpot - 1 hour ago]
Should You Be Worried About Malicious Things On... [Published Red Orbit - 1 hour ago]
CrowdStrike's Security Experts to Present and E... [Published Vision Monday - 1 hour ago]
Keyboards, USB Devices Can Be Used in Enhanced ... [Published HOTforSecurity - 1 hour ago]
BadUSB: Undetectable USB flaw Could Expose all ... [Published Mac Observer - 1 hour ago]
Undetectable USB Security Flaw Discovered - BadUSB [Published Storage IT Toolbox - 1 hour ago]
The Gathering Cyber Storm [Published Punchline - 1 hour ago]
Threat Outbreak Alert RuleID10888: Email Messag... [Published Threat Outbreak Alerts - 1 hour ago]
Threat Outbreak Alert RuleID10880: Email Messag... [Published Threat Outbreak Alerts - 1 hour ago]
Threat Outbreak Alert RuleID10887: Email Messag... [Published Threat Outbreak Alerts - 1 hour ago]
Threat Outbreak Alert RuleID10891: Email Messag... [Published Threat Outbreak Alerts - 1 hour ago]
Microsoft study: Pirated software injurious to ... [Published Security Today - 1 hour ago]
U.S. Warns Retailers On The New ‘Backoff’ Malwa... [Published Industry Leaders Magazine - 2 hours ago]
Citadel can allow attackers remote access even ... [Published HackSurfer Articles - 2 hours ago]
Russian Bloggers and Media Must Register with G... [Published WebHosting Talk - 2 hours ago]
Welcome to August – Get ready for Black Hat – U... [Published Politico - 2 hours ago]
Citadel Malware Variant Allows Attackers Remote... [Published threatpost - The First Stop for Security News - 2 hours ago]
Use Data Security as a Strategic Advantage [Published Building Products Digest - 2 hours ago]
Fiesta Exploit Kit Delivers Double Payload [Published Softpedia - 2 hours ago]
Stopping Zero Day Exploits For Dummies [Published SearchCIO.in - 2 hours ago]
W32/CleanKido Trojan Removal Tool 1.0 (Freeware) [Published Softpedia - 2 hours ago]
New ransomware is incredibly sophisticated and ... [Published Electronic Products - 3 hours ago]
'BadUSB' malware highlights the danger of plugg... [Published GameDev.net - 3 hours ago]
Friday News & Notes [Published Digital Bond's SCADA Security Portal - 3 hours ago]
1 2 3 4 5 6 7 8 9 10 ...
In Focus
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Content Volume
Document Volume
Network
Network

Blogs

sort by: Date | Relevance
Keyboards, USB Devices Can Be Used in Enhanced ... [Published HOTforSecurity - 1 hour ago]
Keyboards, thumb-drives, mice and other USB devices can be used for enhanced hacking attacks that may bypass traditional security filters, a German cryptography expert revealed. Berlin’s SR Labs Chief Scientist Karsten Nohl discovered that hackers ...
Threat Outbreak Alert RuleID10888: Email Messag... [Published Threat Outbreak Alerts - 1 hour ago]
...
Threat Outbreak Alert RuleID10880: Email Messag... [Published Threat Outbreak Alerts - 1 hour ago]
...
Threat Outbreak Alert RuleID10887: Email Messag... [Published Threat Outbreak Alerts - 1 hour ago]
...
Threat Outbreak Alert RuleID10891: Email Messag... [Published Threat Outbreak Alerts - 1 hour ago]
...
1 2 3 4 5 6 7 8 9 10 ...

Audio/Video

sort by: Date | Relevance
TECH PM - Videogame Console Sales Remain Strong [Published Wall Street Journal Tech News Briefing - May 16 2014]
Target, Neiman Marcus apologize for security br... [Published Reuters Video: Top News - Feb 04 2014]
President Obama's Sit Down Before the Super Bowl [Published Wall Street Journal What's News - Feb 03 2014]
1

Press Releases

sort by: Date | Relevance
MRG Effitas Awards Wontok SafeCentral New Real ... [Published GlobeNewswire: Acquisitions News - Jul 21 2014]
Hexis Cyber Solutions and Infosecurity Magazine... [Published GlobeNewswire: Acquisitions News - Jul 15 2014]
PeerNova Announces Investment by Cyber-Security... [Published GlobeNewswire: Acquisitions News - Jul 08 2014]
Speech: Karen Bradley Speech on UK Cyber Security [Published Keeping the UK safe in cyber space - Activity o ... - Jun 17 2014]
Speech: Karen Bradley Speech on Managing Cyber ... [Published Keeping the UK safe in cyber space - Activity o ... - Jun 17 2014]
1 2 3 4 5
Contact Us
Sales
Support


Freebase CC-BY Some image thumbnails are sourced from Freebase, licensed under CC-BY

Copyright (C) 2014 Silobreaker Ltd. All rights reserved.
The selection and placement of stories and images on any Silobreaker page are determined automatically by a computer program.
The time or date displayed reflects when an article was added to or updated in Silobreaker.